Biblio

Export 21404 results:
2013
Bronk, Christopher, and Eneken Tikk-Ringas. "The Cyber Attack on Saudi Aramco." Survival 55, no. 2 (2013): 81-96.
Boudreaux, Benjamin. "Cyber Diplomats." State Magazine (2013): 32.
Boyanov, Lyuben, and Zlatogor Minchev. Cyber Security Challenges in Smart Homes In NATO ARW “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework". Vol. 38. Ohrid, Macedonia: OS Press, NATO Science for Peace and Security Series - D: Information and Communication Security, 2013.
Wang, Wenye, and Zhuo Lu. "Cyber Security in the Smart Grid: Survey and Challenges." Computer networks 57, no. 5 (2013): 1344-1371.
Cyber Security Strategy of Latvia 2014–2018., 2013.
Cyber Security Strategy of the European Union: An Open, Safe and Secure Cyberspace . Brussels: European Union, 2013.
Cooke, Nancy, Michael Champion, Prashanth Rajivan, and S. Jariwala. "Cyber Situation Awareness and Teamwork." EAI Endorsed Transactions on Security and Safety 1, no. 13 (2013).
Tehrani, Pardis Moslemzade, Nazura Abdul Manap, and Hossein Taji. "Cyber terrorism challenges: The need for a global response to a multi-jurisdictional crime." Computer Law & Security Review 29, no. 3 (2013): 207-215.
Rid, Thomas. Cyber War Will Not Take Place . London: Hurst, 2013.
CyberCrime@IPA In Assessment Report. Council of Europe, 2013.
Air Force Association. CyberPatriot., 2013.
Milina, Velichka. Cybersecurity: A National Strategic Issue In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2013.
GAO), United States Gov. Cybersecurity National Strategy, Roles, and Responsibilities Need to be Better Defined and More Effectively Implemented., 2013.
Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace., 2013.
Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyber-space Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions (p. 20) In High Representative of the European Union for Foreign Affairs and Security Policy. Brussels: European Commission, 2013.
Kovačević, Božo. "Cyberwar – Američka Izlika za Novi Hladni Rat?" Polemos 16, no. 2 (2013): 91-110.
A Dangerous Nexus: Crime, Conflict, and Terrorism in Failing States. International Peace Institute, 2013.
Alter, Benjamin, and Edward Fishman. "The Dark Side Of Energy Independence." The New York Times (2013).
. Data Breach Response Guide. Experian Data Breach Resolution. 2013-2014., 2013.
Jans, Mieke, Nadine Lybaert, and Koen Vanhoof. "Data Mining and Economic Crime Risk Management." In Data Mining: Concepts, Methodologies, Tools, and Applications., 2013.
Foreman, John. Data Smart: Using Data Science to Transform Information into Insight. Wiley, 2013.
Krishnan, Krish. Data Warehousing in the Age of Big Data. Elsevier Inc., 2013.
Le Beau, John J.. "The Death of bin Laden, and the Future of Al-Qaeda." In The Dangerous Landscape, 221-222., 2013.
Lederer, Edith. "Death Toll in Syria Rises to 100,000, UN Chief Ban Ki-Moon Says." Huffington Post (2013).
Neikova, Mariya. "Decentralization of municipalities to municipalities - shortening the distance between citizens and the government." Legal collection 20 (2013).

Pages